Security and Privacy in Vehicular Social Networks

We surveyed and presented the state-of-the-art VC systems, security and privacy architectures and technologies, emphasizing on security and privacy challenges and their solutions for P2P interactions in VSNs towards standardization and deployment. We note that beyond safety applications that have drawn a lot of attention in VC systems, there is significant and rising interest in vehicle-to-vehicle interaction for a range of transportation efficiency and infotainment applications, notably LBS as well as a gamut of services by mobile providers. While this enriches the VC systems and the user experience, security and privacy concerns are also intensified. This is especially so, considering (i) the privacy risk from the exposure of the users to the service providers, and (ii) the security risk from the interaction with malicious or selfish and thus misbehaving users or infrastructure. We showed existing solutions can in fact evolve and address the VSN-specific challenges, and improve or even accelerate the adoption of VSN applications.

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  Refik Molva,et al.  Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network , 2009, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops.

[3]  Panagiotis Papadimitratos,et al.  Securing Vehicular Communications - Assumptions, Requirements, and Principles , 2006 .

[4]  Panagiotis Papadimitratos,et al.  Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.

[5]  Mun Choon Chan,et al.  MobiCent: a Credit-Based Incentive System for Disruption Tolerant Network , 2010, 2010 Proceedings IEEE INFOCOM.

[6]  M. Hansen,et al.  Participatory Sensing , 2019, Internet of Things.

[7]  Juan-Carlos Cano,et al.  Providing accident detection in vehicular networks through OBD-II devices and Android-based smartphones , 2011, 2011 IEEE 36th Conference on Local Computer Networks.

[8]  Panagiotis Papadimitratos,et al.  Towards deploying a scalable & robust vehicular identity and credential management infrastructure , 2014, 2014 IEEE Vehicular Networking Conference (VNC).

[9]  Sha Tao,et al.  Securing smartphone based ITS , 2011, 2011 11th International Conference on ITS Telecommunications.

[10]  Panagiotis Papadimitratos,et al.  Resilient Collaborative Privacy for Location-Based Services , 2015, NordSec.

[11]  Apu Kapadia,et al.  Opportunistic sensing: Security challenges for the new paradigm , 2009, 2009 First International Communication Systems and Networks and Workshops.

[12]  James A. Landay,et al.  UbiGreen: investigating a mobile tool for tracking and supporting green transportation habits , 2009, CHI.

[13]  Liviu Iftode,et al.  The cyber-physical bike: a step towards safer green transportation , 2011, HotMobile '11.

[14]  Kpatcha M. Bayarou,et al.  Copra: Conditional pseudonym resolution algorithm in VANETs , 2013, 2013 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS).

[15]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[16]  Panagiotis Papadimitratos,et al.  Privacy-Preserving Relationship Path Discovery in Social Networks , 2009, CANS.

[17]  J.-P. Hubaux,et al.  Architecture for Secure and Private Vehicular Communications , 2007, 2007 7th International Conference on ITS Telecommunications.

[18]  Ram Dantu,et al.  Safe Driving Using Mobile Phones , 2012, IEEE Transactions on Intelligent Transportation Systems.

[19]  Xiaolei Dong,et al.  Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs , 2015, IEEE Transactions on Information Forensics and Security.

[20]  Panagiotis Papadimitratos,et al.  SEVECOM - Secure Vehicle Communication , 2006 .

[21]  Panagiotis Papadimitratos,et al.  SHIELD: a data verification framework for participatory sensing systems , 2015, WISEC.

[22]  Panagiotis Papadimitratos,et al.  SEROSA: SERvice oriented security architecture for Vehicular Communications , 2013, 2013 IEEE Vehicular Networking Conference.

[23]  Panagiotis Papadimitratos,et al.  SPPEAR: security & privacy-preserving architecture for participatory-sensing applications , 2014, WiSec '14.

[24]  Panagiotis Papadimitratos,et al.  The Key to Intelligent Transportation: Identity and Credential Management in Vehicular Communication Systems , 2015, IEEE Vehicular Technology Magazine.

[25]  Panagiotis Papadimitratos,et al.  On the Performance of Secure Vehicular Communication Systems , 2011, IEEE Transactions on Dependable and Secure Computing.

[26]  Panagiotis Papadimitratos,et al.  VeSPA: vehicular security and privacy-preserving architecture , 2013, HotWiSec '13.

[27]  Xiaodong Lin,et al.  Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Vehicular Technology.

[28]  Radha Poovendran,et al.  AMOEBA: Robust Location Privacy Scheme for VANET , 2007, IEEE Journal on Selected Areas in Communications.

[29]  Michael Weber,et al.  V-Tokens for Conditional Pseudonymity in VANETs , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[30]  Deepak Kshirsagar,et al.  Privacy and Security: Online Social Networking , 2013 .

[31]  Elaine Shi,et al.  TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[32]  Panos Kalnis,et al.  Providing K-Anonymity in location based services , 2010, SKDD.

[33]  Panagiotis Papadimitratos,et al.  Ieee Transactions on Dependable and Secure Computing, Special Issue on " Security and Privacy in Mobile Platforms " , 2014 Hiding in the Mobile Crowd: Location Privacy through Collaboration , 2022 .

[34]  Fan Ye,et al.  Mobile crowdsensing: current state and future challenges , 2011, IEEE Communications Magazine.

[35]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.

[36]  Panagiotis Papadimitratos,et al.  Secure and Privacy-Preserving Smartphone-Based Traffic Information Systems , 2015, IEEE Transactions on Intelligent Transportation Systems.

[37]  Pin-Han Ho,et al.  ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[38]  Tarek F. Abdelzaher,et al.  GreenGPS: a participatory sensing fuel-efficient maps application , 2010, MobiSys '10.

[39]  Hovav Shacham,et al.  Group signatures with verifier-local revocation , 2004, CCS '04.

[40]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[41]  Azzedine Boukerche,et al.  HyDi: a hybrid data dissemination protocol for highway scenarios in vehicular ad hoc networks , 2012, DIVANet@MSWiM.

[42]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[43]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.

[44]  Frank Kargl,et al.  Redundancy-based statistical analysis for insider attack detection in VANET aggregation schemes , 2014, 2014 IEEE Vehicular Networking Conference (VNC).

[45]  Paulo S. L. M. Barreto,et al.  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.

[46]  Frank Kargl,et al.  PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET) , 2014, 2014 IEEE Vehicular Networking Conference (VNC).

[47]  Panos Kalnis,et al.  MobiHide: A Mobilea Peer-to-Peer System for Anonymous Location-Based Queries , 2007, SSTD.

[48]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[49]  Zhendong Ma,et al.  Privacy in inter-vehicular networks: Why simple pseudonym change is not enough , 2010, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS).

[50]  Hovav Shacham,et al.  Short Group Signatures , 2004, CRYPTO.

[51]  Eylem Ekici,et al.  Wireless Access in Vehicular Environments , 2009, EURASIP J. Wirel. Commun. Netw..